CN104516679B - A kind of RAID data processing method and processing device - Google Patents

A kind of RAID data processing method and processing device Download PDF

Info

Publication number
CN104516679B
CN104516679B CN201310463514.6A CN201310463514A CN104516679B CN 104516679 B CN104516679 B CN 104516679B CN 201310463514 A CN201310463514 A CN 201310463514A CN 104516679 B CN104516679 B CN 104516679B
Authority
CN
China
Prior art keywords
data
verification
raid
subelement
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310463514.6A
Other languages
Chinese (zh)
Other versions
CN104516679A (en
Inventor
邱华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Sequoia Polytron Technologies Inc
Original Assignee
Hangzhou Sequoia Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Sequoia Polytron Technologies Inc filed Critical Hangzhou Sequoia Polytron Technologies Inc
Priority to CN201310463514.6A priority Critical patent/CN104516679B/en
Publication of CN104516679A publication Critical patent/CN104516679A/en
Application granted granted Critical
Publication of CN104516679B publication Critical patent/CN104516679B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/142Reconfiguring to eliminate the error
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems

Abstract

The present invention provides a kind of RAID data processing method and processing device, and applied in computer system, the RAID includes n+m member's disk, and the wherein each sticks of the RAID are divided into w subelement, and this method includes:When failure member number of disks is less than or equal to m, the user data in the data sub-element for needing to write is updated, and use default school to update the verification data in checking method verification group;When failure member number of disks is less than or equal to m, if desired the data sub-element read is located on member's disk of normal condition, corresponding user data is read from the data sub-element, if desired the data sub-element read is located on failure member's disk, then the user data in the data sub-element is recovered according to the default checking algorithm.In terms of existing technologies, the present invention realizes the RAID that same checking algorithm supports multiple check disks, and verification calculating process is relatively easy.

Description

A kind of RAID data processing method and processing device
Technical field
The present invention relates to technical field of data storage, more particularly to a kind of RAID data processing method and processing device.
Background technology
RAID(Redundant Array of Independent disks,RAID)It is a kind of many Individual independent physical disk(disk)The disk group combined to form, therefore can be provided to subscriber's main station than single magnetic The higher storage performance of disk, and data backup function can be provided.According to different Method of Data Organization, conventional RAID includes A variety of ranks such as RAID0, RAID1, RAID5, RAID6, RAID10.Include following technical definition in RAID.
Band:Continuous data are divided into etc. the data block of size, the data of each data block according to RAID algorithm It is written on RAID member's disk.Data block after the isometric segmentation of continuous data is referred to as band, and data block size is referred to as band Size.
Stick:The data distribution of each band is on multiple member's disks, the sky that band takes on each member's disk Between size be referred to as stick.
Data cell:Represent the stick for depositing user data.
Verification unit:Represent the stick for depositing verification data.
Verification group:In one band, the set being made up of multiple data cells and a verification unit, in verification unit The user data of verification data data cell in the band is calculated by RAID checking algorithms and obtained.
RAID is synchronous:By RAID checking algorithms, calculate verification data and write the processing procedure of verification unit.
RAID is rebuild:After RAID member's disk failure or extraction, by RAID algorithm, calculate failed disk or be pulled out Data in disk, and reconstruction disk is write, recover the process of RAID data redundancy.
In order to avoid single disk failure causes loss of data, storage system is protected usually using RAID technique to data Shield.For redundancy RAID, the tolerable failed disk numbers of RAID depend on RAID.It can trigger and rebuild after disk failure, That is, failed disk is replaced using HotSpare disk, by RAID algorithm for reconstructing on the data reconstruction in faulty disk to HotSpare disk, recovered RAID redundancy.Common redundancy RAID algorithm includes:
RAID5 checking algorithms:1 disk failures data is supported not lose, RAID5 active volumes=(n-1)× minimum Member's disk size, wherein n refer to member's number of disks.
RAID6 checking algorithms:2 disks data that break down simultaneously are supported not lose, RAID6 active volumes=(n-2)× Least member's disk size, wherein n refer to member's number of disks.
RAID10 checking algorithms:The non-multiple disks of same mirror image pairs are supported while the data that break down are not lost, RAID10 active volumes=(n/2)X disk minimum capacities, wherein n refers to member's number of disks.
RAID6 algorithms can ensure, a bar takes 2 disks while when occurring media error, still can be by this The data reconstruction that bar takes other disks is out of order the data of disk.The RAID of other ranks also has the advantage and shortcoming of itself, Such as RAID10 can support the non-multiple disks of same mirror image pairs while the data that break down are not lost, but its capacity Utilization rate only has 1/2, therefore from the point of view of rate of return on investment, RAID10 is not an ideal chose;And RAID10 can not be solved , there is the risk of loss of data in the situation that certainly same 2 disks of mirror image pairs break down simultaneously.RAID5 algorithms capacity profit It is high with rate, but 1 disk failure is only supported, the risk factor of loss of data has of a relatively high.RAID6 algorithm capacity utilizations Between RAID10 and RAID5, but obtained because verification data is calculated using two kinds of algorithms of different, the realization of algorithm aspect It is considerably complicated, in addition, RAID6 does not support to be more than 2 disks while breaking down, in the scene higher to reliability requirement, RAID6 flexibility and autgmentability are relatively poor.
The content of the invention
In view of this, the present invention provides a kind of RAID data processing unit, and applied in computer system, the RAID includes N+m member's disk, the wherein each sticks of the RAID are divided into w subelement, and each band includes k in the RAID According to subelement and j verification subelement, wherein j=wxm, k=wxn, wherein n, m and w are natural number, and w is more than 1;Each Verification subelement is under the jurisdiction of a verification group, and each verification group also includes the data sub-element collection that multiple data sub-elements are constituted Close, the data sub-element set of each verification group is different in each band;It is multiple in each verification group in each band Position of the data sub-element in band is uniquely corresponding to multiple in default RAID generator matrixes correspondence a line effectively identify Position;The device includes writing processing module and reads processing unit;Wherein:
Processing module is write, for handling the write order from user side, when failure member number of disks is less than or equal to m When, determine the data sub-element write the need for write order correspondence;Update the number of users in the data sub-element for needing to write According to, and update the verification data in verification group belonging to all data sub-elements in verification subelement using default checking algorithm;
Processing module is read, for handling the read command from user side, when failure member number of disks is less than or equal to m When, the data sub-element read the need for read command correspondence is determined, the data sub-element if desired read is located at normal condition Member's disk on, corresponding user data is read from the data sub-element, the data sub-element if desired read be located at therefore Hinder on member's disk, then current addressable data sub-element and syndrome list in the recovery group according to belonging to the data sub-element Data in member recover the user data in the data sub-element using the default checking algorithm.
Further, it is using the specific formula of default checking algorithm renewal verification data:
Subelement wherein in the formula where all data constitutes a verification group, and h is the natural number less than or equal to j;x It is the natural number less than or equal to k with y;chRepresent to verify the verification data in subelement in the band in h-th of verification group; dx......dyFor the user data in multiple data sub-elements in the verification group, every number wherein in data sub-element set Multiple positions effectively identified in h rows are corresponded respectively in the RAID generator matrixes according to position of the subelement in band;Represent XOR.
Further, the generator matrix of the RAID is the matrix of a j rows k row, wherein the i-th column element of h rows ahiIt is right I-th of data sub-element in band is answered, if ahiFor effectively mark, represent band in i-th of data sub-element belong to h-th Verification group;If ahiFor invalidated identification, represent that i-th of data sub-element is not belonging to h-th of verification group.
Further, having between the generator matrix of the RAID and selected m row n row Galois Field constant matrices is reflected Relation is penetrated, its mapping relations is:Generated after each constant in the constant matrices is converted into the embedded matrix of a w rows w row Matrix be the RAID generator matrixes, wherein w is the Galois Field constant matrices Galois Field bit wide.
Further, the constant matrices is full rank, and any submatrix of the matrix is also full rank.
Further, wherein the n is more than or equal to the w powers that m, n and m sum are less than or equal to 2.
Further, it is using the specific formula of the default checking algorithm restoring user data:
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one in the formula Individual recovery group, dwFor the user data in the data sub-element of inaccessible in a recovery group;Cu...... it is the recovery group In it is addressable verification subelement in verification data;Dx...... represent in the recovery group in addressable data sub-element User data;Represent XOR;Position of each subelement on disk corresponds to RAID recovery squares in one recovery group Multiple effective marks in battle array in a line.
Further, the RAID recovers the matrix that matrix is a j rows s row, and wherein s=w ×(m+n);The RAID is extensive The i-th column element of h rows a in complex matrixhiI-th of subelement in correspondence band, if ahiFor effectively mark, represent band in I-th of subelement belongs to h-th of recovery group;If ahiFor invalidated identification, represent that i-th of subelement is not belonging to h-th of verification group.
Further, in addition to matrix disposal module, the matrix disposal module is used for according to default RAID extended matrixes Generate the RAID and recover matrix, the process of generation includes:By row progress pair corresponding with failed disk in RAID extended matrixes Angling processing recovers matrix to generate the RAID;The diagonalization that the RAID extended matrixes are arranged by RAID generator matrixes and j rows j Check matrix docking is formed;Include an effectively mark in the check matrix per a line, effective mark is in check matrix Position and RAID generator matrixes to dock position of the corresponding verification subelement of row in band corresponding.
Further, in addition to rebuild processing module, wherein the reconstruction processing module using the default checking algorithm it is extensive Multiple verification data, and specifically formula is:
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one in the formula Individual recovery group, cvFor the verification data in the verification subelement of inaccessible in a recovery group;cu... in being the recovery group Verification data in addressable verification subelement;dx... represent the use in addressable data sub-element in the recovery group User data;Represent XOR;Position of each subelement on disk corresponds to RAID recovery matrixes in one recovery group Multiple effective marks in middle a line.
The present invention also provides a kind of RAID data processing method, applied in computer system, the RAID include n+m into Member's disk, the wherein each sticks of the RAID are divided into w subelement, and each band includes k according to sub single in the RAID Member and j verification subelement, wherein j=wxm, k=wxn, wherein n, m and w are natural number, and w is more than 1;Each syndrome Unit is under the jurisdiction of a verification group, and each verification group also includes the data sub-element set that multiple data sub-elements are constituted, each The data sub-element set of each verification group is different in band;Multiple data in each band in each verification group is single Position of the member in band is uniquely corresponding to multiple positions effectively identified in default RAID generator matrixes correspondence a line;The party Method comprises the following steps:
Step A, handles the write order from user side, when failure member number of disks is less than or equal to m, it is determined that this is write The data sub-element write the need for order correspondence;The user data in the data sub-element for needing to write is updated, and using pre- If checking algorithm updates the verification data in verification subelement in verification group belonging to all data sub-elements;
Step B, handles the read command from user side, when failure member number of disks is less than or equal to m, determines the reading The data sub-element read the need for order correspondence, the data sub-element if desired read is located at member's disk of normal condition On, corresponding user data is read from the data sub-element, the data sub-element if desired read is located at failure member's disk On, then in the recovery group according to belonging to the data sub-element current addressable data sub-element and verification subelement in data The user data in the data sub-element is recovered using the default checking algorithm.
Further, it is using the specific formula of default checking algorithm renewal verification data:
Subelement wherein in the formula where all data constitutes a verification group, and h is the natural number less than or equal to j;x It is the natural number less than or equal to k with y;chRepresent to verify the verification data in subelement in the band in h-th of verification group; dx......dyFor the user data in multiple data sub-elements in the verification group, every number wherein in data sub-element set Multiple positions effectively identified in h rows are corresponded respectively in the RAID generator matrixes according to position of the subelement in band;Represent XOR.
Further, the generator matrix of the RAID is the matrix of a j rows k row, wherein the i-th column element of h rows ahiIt is right I-th of data sub-element in band is answered, if ahiFor effectively mark, represent band in i-th of data sub-element belong to h-th Verification group;If ahiFor invalidated identification, represent that i-th of data sub-element is not belonging to h-th of verification group.
Further, having between the generator matrix of the RAID and selected m row n row Galois Field constant matrices is reflected Relation is penetrated, its mapping relations is:Generated after each constant in the constant matrices is converted into the embedded matrix of a w rows w row Matrix be the RAID generator matrixes, wherein w is the Galois Field constant matrices Galois Field bit wide.
Further, the constant matrices is full rank, and any submatrix of the matrix is also full rank.
Further, wherein the n is more than or equal to the w powers that m, n and m sum are less than or equal to 2.
Further, it is using the specific formula of the default checking algorithm restoring user data:
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one in the formula Individual recovery group, dwFor the user data in the data sub-element of inaccessible in a recovery group;Cu...... it is the recovery group In it is addressable verification subelement in verification data;Dx...... represent in the recovery group in addressable data sub-element User data;Represent XOR;Position of each subelement on disk corresponds to RAID recovery matrixes in one recovery group Multiple effective marks in middle a line.
Further, the RAID recovers the matrix that matrix is a j rows s row, and wherein s=w ×(m+n);The RAID is extensive The i-th column element of h rows a in complex matrixhiI-th of subelement in correspondence band, if ahiFor effectively mark, represent band in I-th of subelement belongs to h-th of recovery group;If ahiFor invalidated identification, represent that i-th of subelement is not belonging to h-th of verification group.
Further, in addition to:
Step C, generates the RAID according to default RAID extended matrixes and recovers matrix, the process of generation includes:Will Row corresponding with failed disk carry out diagonalization processing to generate the RAID recoveries matrix in RAID extended matrixes;The RAID The diagonalization check matrix docking that extended matrix is arranged by RAID generator matrixes and j rows j is formed;Per a line bag in the check matrix An effectively mark is included, the position of effective mark in check matrix syndrome list corresponding with RAID generator matrixes docking row Position of the member in band is corresponding.
Further, in addition to:Step D, verification data is recovered in process of reconstruction using the default checking algorithm, and Specifically formula is:
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one in the formula Individual recovery group, cvFor the verification data in the verification subelement of inaccessible in a recovery group;cu... in being the recovery group Verification data in addressable verification subelement;dx... represent the use in addressable data sub-element in the recovery group User data;Represent XOR;Position of each subelement on disk corresponds to RAID recovery matrixes in one recovery group Multiple effective marks in middle a line.
In terms of existing technologies, the present invention realizes the RAID that same checking algorithm supports multiple check disks, and Verify calculating process relatively easy, it is not necessary to complicated calculating process.
Brief description of the drawings
Fig. 1 is data tissue relation schematic diagram in RAID stripe in the prior art.
Fig. 2 is the logical construction schematic diagram of RAID data processing unit in one embodiment of the present invention.
Fig. 3 is the schematic diagram of generation RAID generator matrixes in one embodiment of the present invention.
Fig. 4 is data relationship schematic diagram in a verification group in one embodiment of the present invention.
Corresponding RAID generator matrixes schematic diagram when Fig. 5 is disk failure in one embodiment of the present invention.
Fig. 6 is the diagonalization process schematic of generation RAID recovery matrixes in one embodiment of the present invention.
Embodiment
In view of the shortcomings of the prior art, the present invention proposes a kind of brand-new RAID implementations, is supported using single algorithm Multiple disks break down simultaneously when, remain able to recover data, and to multiple faulty disks without requirement in logic, lift RAID The flexibility used and robustness.In realization, data cell or school are used as relative to using a stick in traditional RAID stripe Stick is further subdivided into smaller subelement by the design of verification certificate member, the present invention, and the subelement of storage user data is referred to as number According to subelement, in the verification data write-in verification subelement that data XOR is obtained in multiple data sub-elements, data is single First and corresponding verification subunit constitutes a verification group.In the following description, unless otherwise noted, the word of all expression quantity Mother is natural number.
Fig. 2 is refer to, in a preferred embodiment, the present invention provides a kind of applied to enhanced in computer system RAID data processing unit, the RAID includes n+m member's disk, and the wherein each sticks of the RAID are divided into w son list Each band includes k according to subelement and j verification subelement, wherein wherein j=wxm, k=wxn, n, m in member, the RAID And w is natural number, w is more than 1;Each verification subelement is under the jurisdiction of a verification group, and each verification group also includes many numbers The data sub-element set of each verification group is different in the data sub-element set constituted according to subelement, each band;Often Position of multiple data sub-elements in band in individual band in each verification group is uniquely corresponding to default RAID generations square The multiple position effectively identified devices include writing processing module and read processing unit in battle array correspondence a line.RAID processing dresses Put including:Write processing module and read processing module.The computer system refers to the equipment for including several member's disks, its It is probably any form of computing system, such as work station, either server or the special network storage equipment, or even can It can be personal main frame.It should be noted that RAID data processing unit can use software to realize, hardware can also be used to realize, The such as form such as RAID plug-in cards, it might even be possible to realized using the mode of soft or hard combination.The processing procedure of the device includes following step Suddenly:
Processing module is write, for handling the write order from user side, when failure member number of disks is less than or equal to m When, determine the data sub-element write the need for write order correspondence;Update the number of users in the data sub-element for needing to write According to, and update the verification data in verification group belonging to all data sub-elements in verification subelement using default checking algorithm;
Processing module is read, for handling the read command from user side, when failure member number of disks is less than or equal to m When, the data sub-element read the need for read command correspondence is determined, the data sub-element if desired read is located at normal condition Member's disk on, corresponding user data is read from the data sub-element, the data sub-element if desired read be located at therefore Hinder on member's disk, then current addressable data sub-element and syndrome list in the recovery group according to belonging to the data sub-element Data in member recover the user data in the data sub-element using the default checking algorithm.
N represents the number of the data disks in a RAID stripe as previously described, and m represents the verification list in a RAID stripe The upper limit of the patient failed disk number of first number, the i.e. RAID.In addition to n and m, also introduce Galois Field bit wide w this Individual parameter, in the case of being not particularly illustrated below, each parameter for characterizing quantity is natural number.Above-mentioned parameter in RAID It is generally necessary to meet formula(1)With(2)Basic constraints:
n≥m (1)
2w≥n+m (2)
In the present invention, w × m verification group will be included in a RAID band, each verification group includes a school Test subelement.The corresponding relation of data sub-element and verification subelement can be by a RAID generator matrix come table in verification group Reach.The RAID of this in Fig. 4 generator matrixes from m rows n row original constant matrices, element in the original constant matrices by Element in selected Galois Field is constituted, and generally meets following 2 conditions:
Condition one:Constant matrices is full rank, i.e., constant matrices is that reversible, each row is all linear incoherent.
Condition two:Any submatrix of constant matrices is also full rank, i.e. any submatrix of constant matrices is reversible, each Row is all linear incoherent.
Meeting the original constant matrices of above-mentioned condition has a variety of, and one of which matrix may be selected when realizing and make by developer For original constant matrices.Each constant can be exchanged into a unique corresponding w rows w and arrange by " 0 " in the original constant matrices chosen The embedded matrix that " 1 " is constituted, obtains matrix after all original constant matrices conversions and is referred to as RAID generator matrixes.The RAID is generated Matrix is j row k column matrix, wherein, j=(w×m), k=(w×n), such as formula(3)It is shown:
The i-th column element of h rows a in RAID generator matrixeshiI-th of data sub-element in correspondence band, if ahiTo have Criterion is known, and represents that i-th of data sub-element belongs to h-th of verification group in band;If ahiFor invalidated identification, i-th of number is represented H-th of verification group is not belonging to according to subelement;The wherein a in preferred modehiValue correspond to and invalidated identification and have respectively for 0 or 1 Criterion is known.All data sub-elements are numbered in order in a RAID band, and all verification subelements are in sequence It is numbered.The line number of RAID generator matrixes is represented to verify the numbering of subelement, and the element of all numerical value 1 is constituted in the row One effective mark group.After having a RAID generator matrixes, it is possible to according to formula(4)Subelement is verified to calculate in verification group Verification data.
The wherein formula(4)In subelement where all data constitute a verification group, h is the nature less than or equal to j Number;X and y is the natural number less than or equal to k;chRepresent to verify the verification data in subelement in the band in h-th of verification group; dx......dyFor the user data in multiple data sub-elements in the verification group, every number wherein in data sub-element set Multiple positions effectively identified in h rows are corresponded respectively in the RAID generator matrixes according to position of the subelement in band;Represent XOR.
Illustrated below by taking the RAID of 8 disk compositions as an example.Assuming that the RAID includes 5 data disks;3 check disks; The decile of band 3;Now n=5, m=3, w=3, j==m × w=9, k=n × w=15, it is assumed that original constant matrices is such as formula(5)Institute Show:
The transformational relation shown in Fig. 3 is refer to, each constant in original constant matrices is done into embedded matrix converts, and this is original Constant matrices obtains corresponding RAID generator matrixes such as formula after above-mentioned conversion(6)It is shown:
It refer to shown in Fig. 4, it is assumed that middle de, f represent the user data in data sub-element, cp, q represents to verify subelement In verification data.According to above-mentioned RAID generator matrixes, the relation in each verification group between verification data and user data can To pass through formula group(7)In 9 verification groups description.
Figure 4, it is seen that in first verification group, check the 1st row of RAID generator matrixes it is recognised that the 1st, 4th, 5,9,10,11,12, the numerical value of 14 is 1, and this 8 numerical value can be understood as RAID corresponding with first verification subelement Effective mark group in generator matrix in the 1st row.So participate in calculating verification data c0,0 in first verification group in band 1 User data is respectively the 1st, the user data in 4,5,9,10,11,12,14 data sub-elements, and then can obtain formula Group(7)In first operation relation.The calculation of other verification datas is similar, repeats no more.
In the case of all disks are in place and normal in RAID, when receiving read command from user side, directly read User data in corresponding data sub-element.When receiving write order from user side, it is necessary to according to formula(7)First count Verification data is calculated, can be handled according to below step:
(1)It is determined that the verification group involved by write-in data, determines to need data for participating in calculating single in those verification groups First user data, for the data sub-element without write-in, the user data in the retaking of a year or grade data sub-element;
(2)According to formula(7)Calculate the new verification data of those verification groups;
(3)New user data is write corresponding data sub-element, verification data write-in correspondence verification subelement.
It is worth noting that, in the present invention, multiple schools may be influenceed by updating the user data in some data sub-element Group is tested, therefore formula will be obtained when calculating verification data(7)In multiple verification computing formulas, calculate the verifications in multiple verification groups Data, and it is written to corresponding verification unit.
As it was previously stated, RAID of the present invention supports m check disk, i.e., 1 to arrive in the case of m disk failure, user data is not It can lose.Under normal circumstances, read user data and be not related to verification data;But after disk failure, read write command will be related to school Test processing.When receiving read command from user side, if the read command data cell to be accessed may have access to, number can be directly read According to;If the data cell of read command hit can not be accessed, the number by addressable data cell and verification unit is needed According to being recovered.Same reason, if there is disk failure in RAID, equally influences whether the processing of write order, as it was previously stated, writing Order may be related to the user data in back read data subelement, and the user data probably due to disk failure and can not read Take.Either handle during read command or write order, if the user data in data sub-element can not be read, can adopt User data is recovered with following manner.
Continuation illustrates restoring user data read procedure with identical example, it is assumed that disk3 failures, corresponds to band 1, i.e., Stick D3 loses, including d3,0, d3,1 and d3, the user data in 2 three data sub-elements.Choose verification formula group(7)In First three verification group formula(8)To solve equation, d3 in equation, 0, d3,1 and d3,2 be unknown number, other are given data.
Solve formula(8), the 2nd row is added to other two rows, here plus actually xor operation, obtain formula(9):
Again by formula(9)In the 3rd row be added on the 1st row, obtain formula(10):
According to formula(10)Data original in d3,0, d3,1 and d3,2 can be calculated.
Introduce the data recovery under a kind of extreme case again below, it is assumed that m disk failures in RAID.Continue above-mentioned Example, it is assumed that loss is tri- data disks of disk1, disk2, disk3, corresponds to band 1, and the data of loss include d1,0, D1,1, d1,2, d2,0, d2,1, d2,2, d3,0, d3,1, d3,2 totally 9 data cells, according to above-mentioned thinking, changes verification group Formula can obtain formula(11):
According to formula(11)Solve equation can calculate d1,0, d1,1, d1,2, d2,0, d2,1, d2,2, d3,0, d3,1, Original data in d3,2.As long as the quantity that can be seen that failed disk by both the above example is less than or equal to m, the present invention It can go out need the user data recovered based on same checking algorithm Reverse recovery, only the quantity of failed disk is got over Greatly, the amount of calculation of backwards calculation is corresponding bigger in calculating process, solves that formula is more complicated, but the algorithm in solution procedure according to It is so the same, simply direction is reverse solves.
Furthermore, it is contemplated that trigger the problem of calculating complicated when failed disk is more, the present invention is in preferred implementation A kind of more succinct reset mode is provided in mode, it is substantially still above-mentioned checking algorithm, simply introduce RAID and recover Matrix carrys out simplified operation process.Based on above-mentioned RAID generator matrixes, a RAID extended matrix is pre-created.In present embodiment In, said apparatus also includes matrix disposal module, and the matrix disposal module is used to generate institute according to default RAID extended matrixes State RAID and recover matrix, the process of generation includes:Row corresponding with failed disk in RAID extended matrixes are carried out at diagonalization Reason recovers matrix to generate the RAID;The RAID extended matrixes verify square by RAID generator matrixes and j rows the j diagonalization arranged Battle array docking is formed;Include an effectively mark in the check matrix per a line, the position of effective mark in check matrix It is corresponding that position of the corresponding verification subelement of row in band is docked with RAID generator matrixes.
As it was previously stated, the RAID extended matrixes are docked with check matrix by RAID generator matrixes and formed.The RAID expands Exhibition matrix is j × r, wherein r=k+j.A RAID extended matrix is created based on the example in Fig. 4, the matrix such as Fig. 5 is Example, it is assumed that now two disk failures of disk1 and disk2, understands with reference to Fig. 4, recovers in matrix any one in 4-9 row Individual effective mark all points to a data sub-element that can not be accessed, that is, d1,0、d1,1、d1,2、d2,0、d2,1、d2,2This six User data subelement where user data can not be accessed.In the present embodiment, carried out around 4-9 row at diagonalization of matrix Reason, final target is to realize that matrix has 4-9 row all only one of which in 6 rows effectively to identify, that is, only one of which data is single User data in member is unknown data, can be solved followed by once verification computing and obtain the user data.
The diagonalization of matrix process shown in Fig. 6 is refer to, its target is that 4-9 row are carried out into diagonalization processing, that is, Row corresponding with failed disk carry out diagonalization processing in RAID extended matrixes.For the 4th row, a line, selected line are chosen first Criterion knowledge must be there are on the 4th, it can be found that the 4th data of the 1st row are 1 from Fig. 6, criterion knowledge is there are.Now 4th row can be understood as treating zero row, and target is to allow the 4th to arrange the element value of other rows in addition to the 1st row to be all zeroed, also It is to be changed into invalidated identification.XOR now is carried out with the 3rd, 4,7,8,9 rows respectively with the 1st row, the newline gone out with XOR is distinguished Replace the original 3rd, 4,7,8,9 rows, the first intermediary matrix is formed after the completion of replacement.Next the 5th row are arranged as waiting to be zeroed, A line is chosen again, it is desirable to which the 4th column data of selected line is that the 0, the 5th column data is 1, now chooses the row of behavior the 3rd, with the 3rd row point XOR is not carried out with the 1st, 4,5,8 rows, the second intermediary matrix is formed after replacement.So circulation go down until the 9th row be also zeroed, Ultimately form a RAID and recover matrix.From fig. 6 it can be seen that it is to present that RAID, which recovers matrix in 4-9 arranges this six row, Go out diagonalization, i.e. the upper only one of which element of the row of any of which one is 1(Effectively identify).Effective mark is expert at(Computing row) In, only have the element to be 1 in the 4-9 element, other all 0(Invalidated identification).So because other row are corresponding Disk is all that only one of which effectively identifies corresponding data sub-element and can not accessed on the disk of normal condition, computing row, And other data effectively identified in corresponding data sub-element or verification subelement can all be accessed, therefore can be quick Ground is recovered the user data in the data sub-element by XOR algorithm.
Process more than is it can be concluded that number of users when disk failure thereon in any one data sub-element According to can be according to formula(12)Recover.
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one in the formula Individual recovery group, dwFor the user data in the data sub-element of inaccessible in a recovery group;Cu...... it is the recovery group In it is addressable verification subelement in verification data;Dx...... represent in the recovery group in addressable data sub-element User data;Represent XOR;Position of each subelement on disk corresponds to RAID recovery matrixes in one recovery group Multiple effective marks in middle a line.
Please continue to refer to Fig. 6, the 4th element for recovering the 1st row of matrix for RAID is 1, is effective mark, shows bar User data d in band in the 4th data sub-element1,0The verification computing of recovery group is participated in, because it is on failed disk disk1, Therefore the user data seeks to the data recovered.Remaining data for needing to participate in the verification computing of recovery group is d successively0,1、d3,0、 d3,1、d3,2、c0,0、c0,1、c1,0、c2,0, it is all known on normal disk to be all due to these data, is brought into formula 11 It can solve d1,0, it refer to the example of formula 13.
It can be seen from the above that the subelement where the data of computing are participated in a recovery group is in band Position is to recover effective mark group in matrix a line by RAID to be determined.And it is basis that RAID, which recovers matrix, as previously described The generation of RAID extended matrixes.As it was previously stated, the process of generation is will be each corresponding with failed disk in RAID extended matrixes Row carry out diagonalization processing, and finally causing RAID to recover in matrix, only one of which effectively identifies corresponding data on any one row What unit was inaccessible by.It is worth noting that, when realizing, RAID extended matrixes can substitute RAID generation squares in fact Battle array, because including RAID generator matrixes in RAID extended matrixes.The embodiment of verification data in foregoing calculating verification group In can also use RAID extended matrixes, and in fact formula(7)A RAID extended matrix is substantially reflected.
Embodiment more than, which can be seen that the present invention, can not only use single algorithm to support that multiple disks are same When break down, and the algorithm be fairly simple XOR.In general, the present invention improves RAID flexibility and is good for Enable to depart in style, and implementation cost is relatively low.So that a RAID includes eight disks as an example, in the scene of high reliability is needed, n can Think 4, and m can be 4, as long as now the disk of simultaneous faults is no more than 4 in RAID, then user data will not be lost, And 4 faulty disks can be any disk, no logical requirements.Needing reliability and Capacity Ratio more in a balanced way in scene, n can be with For 6, and m can be 2;Assuming that all disk sizes are all identical, then can deposit the available capacity of user data can reach The 75% of all disk sizes.Certain reliability is being needed, but in the scene of limited consideration capacity, n can be 7, and m can be 1.For the developer of field of storage, it no longer needs the difference because RAID, and develops and safeguard many sets and calculate Method, can be greatly lowered development cost.And for a user, it has broken the inflexible problem of m quantity in the prior art, Disk is more in RAID, and its flexibility problem is more prominent, and the present invention has no the limitation of this respect.
Furthermore, it is understood that the present invention can further include synchronous processing module and rebuild processing module, for For RAID synchronizing characteristics, it is to calculate verification data write-in verification subelement, therefore can equally be calculated using foregoing formula Go out in each verification group the verification data verified in subelement, write corresponding verification subelement.Certainly, one in the present invention Individual bar, which takes, has multiple verification groups, it is necessary to all verifications in the data and the write-in that calculate multiple verification units respectively, the band After the verification data of unit writes successfully, just think that the band is synchronously completed.For RAID reconstructions, before equally may be referred to State and recover the process of data to calculate data original in the data cell that can not be accessed or verification unit, write-in rebuilds disk and is Can.
In a preferred embodiment, present invention additionally comprises synchronous processing module and reconstruction processing module.The synchronization Processing module, the verification data calculated according to above-mentioned same checking algorithm in each verification subelement realizes RAID synchronization. The reconstruction equally applicable above-mentioned checking algorithm of processing module is extensive by the user data in each data sub-element in failed disk Appear again and come and be written on HotSpare disk in corresponding data sub-element.In process of reconstruction, for the check number in failed disk According to;The reconstruction processing module can equally use the checking algorithm to be come out data recovery is verified, and its specific formula is formula (13):
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one in the formula Individual recovery group, cvFor the verification data in the verification subelement of inaccessible in a recovery group;cu... in being the recovery group Verification data in addressable verification subelement;dx... represent the use in addressable data sub-element in the recovery group User data;Represent XOR;Position of each subelement on disk corresponds to RAID and recovered in matrix in one recovery group Multiple effective marks in a line.More specifically realize, its principle is consistent with foregoing restoring user data process, no longer go to live in the household of one's in-laws on getting married State.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of protection of the invention.

Claims (18)

1. a kind of RAID data processing unit, applied in computer system, the RAID includes n+m member's disk, wherein should The each sticks of RAID are divided into w subelement, and each band includes k according to subelement and j verification in the RAID Subelement, wherein j=w*m, k=w*n, wherein n, m and w are natural number, and w is more than 1;The n be more than or equal to m, n and m it With the w powers less than or equal to 2;Each verification subelement is under the jurisdiction of a verification group, and each verification group also includes multiple data The data sub-element set of each verification group is different in the data sub-element set of unit composition, each band;Each bar Each verification group that band is included in multiple verification groups, the multiple verification group includes multiple data sub-elements, the RAID correspondences Default RAID generator matrixes include multirow, each verification group one in every a line and multiple verification groups in the multirow One correspondence;Include multiple positions effectively identified per a line;Each data sub-element is in bar in the multiple data sub-element Position in band is corresponded with the multiple each position effectively identified;It is characterized in that:
Processing module is write, for handling the write order from user side, when failure member number of disks is less than or equal to m, really The data sub-element write the need for fixed write order correspondence;The user data in the data sub-element for needing to write is updated, and The verification data in verification group belonging to all data sub-elements in verification subelement is updated using default checking algorithm;
Processing module is read, for handling the read command from user side, when failure member number of disks is less than or equal to m, really The data sub-element read the need for fixed read command correspondence, the data sub-element if desired read is located at the member of normal condition On disk, corresponding user data is read from the data sub-element, the data sub-element if desired read is located at failure member On disk, then in the recovery group according to belonging to the data sub-element current addressable data sub-element and verification subelement in Data recover the user data in the data sub-element using the default checking algorithm.
2. device as claimed in claim 1, it is characterised in that:The specific formula of verification data is updated using default checking algorithm For:
<mrow> <msub> <mi>c</mi> <mi>h</mi> </msub> <mo>=</mo> <msub> <mi>d</mi> <mi>x</mi> </msub> <mo>&amp;CirclePlus;</mo> <mo>...</mo> <mo>...</mo> <mo>&amp;CirclePlus;</mo> <msub> <mi>d</mi> <mi>y</mi> </msub> </mrow>
Subelement wherein in the formula where all data constitutes a verification group, and h is the natural number less than or equal to j;X and y For the natural number less than or equal to k;chRepresent to verify the verification data in subelement in the band in h-th of verification group; dx......dyFor the user data in multiple data sub-elements in the verification group, every number wherein in data sub-element set Multiple positions effectively identified in h rows are corresponded respectively in the RAID generator matrixes according to position of the subelement in band;Represent XOR.
3. device as claimed in claim 2, it is characterised in that:The generator matrix of the RAID is the matrix of a j rows k row, its In the i-th column element of h rows ahiI-th of data sub-element in correspondence band, if ahiFor effectively mark, represent band in i-th Individual data sub-element belongs to h-th of verification group;If ahiFor invalidated identification, represent that i-th of data sub-element is not belonging to h-th of school Test group.
4. device as claimed in claim 3, it is characterised in that:The generator matrix of the RAID and selected m row n row Galois There are mapping relations between the constant matrices of domain, its mapping relations is:Each constant in the constant matrices is converted into a w The matrix generated after the embedded matrix of row w row is the RAID generator matrixes, and wherein w is the Galois Field constant matrices Galois Domain bit wide.
5. device as claimed in claim 4, it is characterised in that:The constant matrices is full rank, and the anyon of the matrix Matrix is also full rank.
6. device as claimed in claim 1, it is characterised in that:Use the specific of the default checking algorithm restoring user data Formula is:
<mrow> <msub> <mi>d</mi> <mi>w</mi> </msub> <mo>=</mo> <msub> <mi>d</mi> <mi>x</mi> </msub> <mo>&amp;CirclePlus;</mo> <mo>...</mo> <mo>...</mo> <mo>&amp;CirclePlus;</mo> <msub> <mi>c</mi> <mi>u</mi> </msub> <mo>...</mo> <mo>...</mo> </mrow> 1
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one are extensive in the formula Multiple group, dwFor the user data in the data sub-element of inaccessible in a recovery group;cu... it is that can visit in the recovery group Verification data in the verification subelement asked;dx... represent the number of users in addressable data sub-element in the recovery group According to;Represent XOR;Position of each subelement on disk corresponds to RAID and recovered one in matrix in one recovery group Multiple effective marks in row.
7. device as claimed in claim 6, it is characterised in that:The RAID recovers the matrix that matrix is a j rows s row, wherein s =w × (m+n);The RAID recovers the i-th column element of h rows a in matrixhiI-th of subelement in correspondence band, if ahi's For effectively mark, represent that i-th of subelement belongs to h-th of recovery group in band;If ahiFor invalidated identification, i-th of son is represented Unit is not belonging to h-th of verification group.
8. device as claimed in claim 7, it is characterised in that:Also include matrix disposal module, the matrix disposal module is used for The RAID is generated according to default RAID extended matrixes and recovers matrix, the process of generation includes:By in RAID extended matrixes with The corresponding row of failed disk carry out diagonalization processing and recover matrix to generate the RAID;The RAID extended matrixes are given birth to by RAID Formed into the diagonalization check matrix docking that matrix and j rows j are arranged;Include an effectively mark in the check matrix per a line, Position of the position of effective mark in the check matrix verification subelement corresponding with RAID generator matrixes docking row in band Put corresponding.
9. device as claimed in claim 6, it is characterised in that:Also include rebuilding processing module, wherein the reconstruction processing module Recover verification data using the default checking algorithm, and specific formula is:
<mrow> <msub> <mi>c</mi> <mi>v</mi> </msub> <mo>=</mo> <msub> <mi>d</mi> <mi>x</mi> </msub> <mo>&amp;CirclePlus;</mo> <mo>...</mo> <mo>...</mo> <mo>&amp;CirclePlus;</mo> <msub> <mi>c</mi> <mi>u</mi> </msub> <mo>...</mo> <mo>...</mo> </mrow>
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one are extensive in the formula Multiple group, cvFor the verification data in the verification subelement of inaccessible in a recovery group;cu... it is that can visit in the recovery group Verification data in the verification subelement asked;dx... represent the number of users in addressable data sub-element in the recovery group According to;Represent XOR;Position of each subelement on disk corresponds to RAID and recovered one in matrix in one recovery group Multiple effective marks in row.
10. a kind of RAID data processing method, applied in computer system, the RAID includes n+m member's disk, wherein should The each sticks of RAID are divided into w subelement, and each band includes k according to subelement and j verification in the RAID Subelement, wherein j=w*m, k=w*n, wherein n, m and w are natural number, and w is more than 1;The n be more than or equal to m, n and m it With the w powers less than or equal to 2;Each verification subelement is under the jurisdiction of a verification group, and each verification group also includes multiple data The data sub-element set of each verification group is different in the data sub-element set of unit composition, each band;Each bar Each verification group that band is included in multiple verification groups, the multiple verification group includes multiple data sub-elements, the RAID correspondences Default RAID generator matrixes include multirow, each verification group one in every a line and multiple verification groups in the multirow One correspondence;Include multiple positions effectively identified per a line;Each data sub-element is in bar in the multiple data sub-element Position in band is corresponded with the multiple each position effectively identified;Characterized in that, this method includes following step Suddenly:
Step A, handles the write order from user side, when failure member number of disks is less than or equal to m, determines the write order The data sub-element write the need for correspondence;The user data in the data sub-element for needing to write is updated, and uses default school Checking method updates the verification data in verification subelement in verification group belonging to all data sub-elements;
Step B, handles the read command from user side, when failure member number of disks is less than or equal to m, determines the read command The data sub-element read the need for correspondence, the data sub-element if desired read is located on member's disk of normal condition, from Corresponding user data is read in the data sub-element, the data sub-element if desired read is located on failure member's disk, then Current addressable data sub-element and the data verified in subelement are used in the recovery group according to belonging to the data sub-element The default checking algorithm recovers the user data in the data sub-element.
11. method as claimed in claim 10, it is characterised in that:The specific calculation of verification data is updated using default checking algorithm Formula is:
<mrow> <msub> <mi>c</mi> <mi>h</mi> </msub> <mo>=</mo> <msub> <mi>d</mi> <mi>x</mi> </msub> <mo>&amp;CirclePlus;</mo> <mo>...</mo> <mo>...</mo> <mo>&amp;CirclePlus;</mo> <msub> <mi>d</mi> <mi>y</mi> </msub> </mrow>
Subelement wherein in the formula where all data constitutes a verification group, and h is the natural number less than or equal to j;X and y For the natural number less than or equal to k;chRepresent to verify the verification data in subelement in the band in h-th of verification group; dx......dyFor the user data in multiple data sub-elements in the verification group, every number wherein in data sub-element set Multiple positions effectively identified in h rows are corresponded respectively in the RAID generator matrixes according to position of the subelement in band;Represent XOR.
12. method as claimed in claim 11, it is characterised in that:The generator matrix of the RAID is the matrix of a j rows k row, Wherein the i-th column element of h rows ahiI-th of data sub-element in correspondence band, if ahiFor effectively mark, represent band in I-th of data sub-element belongs to h-th of verification group;If ahiFor invalidated identification, represent that i-th of data sub-element is not belonging to h Individual verification group.
13. method as claimed in claim 12, it is characterised in that:The generator matrix of the RAID and selected m row n Lie Jialuo There are mapping relations between watt domain constant matrices, its mapping relations is:Each constant in the constant matrices is converted to one The matrix generated after the embedded matrix of individual w rows w row is the RAID generator matrixes, and wherein w is the Galois Field constant matrices gal Roua domain bit wide.
14. method as claimed in claim 13, it is characterised in that:The constant matrices is full rank, and the matrix is any Submatrix is also full rank.
15. method as claimed in claim 10, it is characterised in that:Use the tool of the default checking algorithm restoring user data Body formula is:
<mrow> <msub> <mi>d</mi> <mi>w</mi> </msub> <mo>=</mo> <msub> <mi>d</mi> <mi>x</mi> </msub> <mo>&amp;CirclePlus;</mo> <mo>...</mo> <mo>...</mo> <mo>&amp;CirclePlus;</mo> <msub> <mi>c</mi> <mi>u</mi> </msub> <mo>...</mo> <mo>...</mo> </mrow>
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one are extensive in the formula Multiple group, dwFor the user data in the data sub-element of inaccessible in a recovery group;Cu...... being can in the recovery group Verification data in the verification subelement of access;Dx...... the user in addressable data sub-element in the recovery group is represented Data;Represent XOR;Position of each subelement on disk corresponds to RAID and recovered in matrix in one recovery group Multiple effective marks in a line.
16. method as claimed in claim 15, it is characterised in that:The RAID recovers the matrix that matrix is a j rows s row, its Middle s=w × (m+n);The RAID recovers the i-th column element of h rows a in matrixhiI-th of subelement in correspondence band, if ahi For effectively mark, represent band in i-th of subelement belong to h-th of recovery group;If ahiFor invalidated identification, represent i-th Subelement is not belonging to h-th of verification group.
17. method as claimed in claim 16, it is characterised in that:Also include:
Step C, generates the RAID according to default RAID extended matrixes and recovers matrix, the process of generation includes:RAID is expanded Row corresponding with failed disk carry out diagonalization processing to generate the RAID recoveries matrix in exhibition matrix;The RAID extends square The diagonalization check matrix docking that battle array is arranged by RAID generator matrixes and j rows j is formed;Include one in the check matrix per a line Effectively identify, the position of effective mark in check matrix verification subelement corresponding with RAID generator matrixes docking row is in bar Position in band is corresponding.
18. method as claimed in claim 15, it is characterised in that:Also include:
Step D, verification data is recovered in process of reconstruction using the default checking algorithm, and specific formula is:
<mrow> <msub> <mi>c</mi> <mi>v</mi> </msub> <mo>=</mo> <msub> <mi>d</mi> <mi>x</mi> </msub> <mo>&amp;CirclePlus;</mo> <mo>...</mo> <mo>...</mo> <mo>&amp;CirclePlus;</mo> <msub> <mi>c</mi> <mi>u</mi> </msub> <mo>...</mo> <mo>...</mo> </mrow>
Wherein, u is the natural number less than or equal to j;X is the natural number less than or equal to k;All data compositions one are extensive in the formula Multiple group, cvFor the verification data in the verification subelement of inaccessible in a recovery group;cu... it is that can visit in the recovery group Verification data in the verification subelement asked;dx... represent the number of users in addressable data sub-element in the recovery group According to;Represent XOR;Position of each subelement on disk corresponds to RAID and recovered one in matrix in one recovery group Multiple effective marks in row.
CN201310463514.6A 2013-09-30 2013-09-30 A kind of RAID data processing method and processing device Active CN104516679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310463514.6A CN104516679B (en) 2013-09-30 2013-09-30 A kind of RAID data processing method and processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310463514.6A CN104516679B (en) 2013-09-30 2013-09-30 A kind of RAID data processing method and processing device

Publications (2)

Publication Number Publication Date
CN104516679A CN104516679A (en) 2015-04-15
CN104516679B true CN104516679B (en) 2017-10-17

Family

ID=52792063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310463514.6A Active CN104516679B (en) 2013-09-30 2013-09-30 A kind of RAID data processing method and processing device

Country Status (1)

Country Link
CN (1) CN104516679B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850359B (en) * 2015-05-29 2019-01-15 浙江宇视科技有限公司 A kind of RAID array method for reconstructing and device
CN106919340B (en) * 2015-12-28 2020-03-17 南宁富桂精密工业有限公司 System and method for improving RAID reading performance
CN108108263B (en) * 2017-12-14 2020-11-20 联想(北京)有限公司 Data processing method and device for solid state disk
CN110309012B (en) 2018-03-27 2021-01-26 杭州海康威视数字技术股份有限公司 Data processing method and device
CN108595269B (en) * 2018-04-26 2020-10-09 北京腾凌科技有限公司 Data processing method, instruction generation device and data read-write device
CN109144787A (en) * 2018-09-03 2019-01-04 郑州云海信息技术有限公司 A kind of data reconstruction method, device, equipment and readable storage medium storing program for executing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101236517A (en) * 2007-01-31 2008-08-06 富士通株式会社 Raid system and data recovery apparatus using galois field
CN101770409A (en) * 2008-12-31 2010-07-07 成都市华为赛门铁克科技有限公司 Method and device for data backup and recovery in redundant array of inexpensive disks
CN102722340A (en) * 2012-04-27 2012-10-10 华为技术有限公司 Data processing method, apparatus and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8117388B2 (en) * 2009-04-30 2012-02-14 Netapp, Inc. Data distribution through capacity leveling in a striped file system
US8266501B2 (en) * 2009-09-29 2012-09-11 Micron Technology, Inc. Stripe based memory operation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101236517A (en) * 2007-01-31 2008-08-06 富士通株式会社 Raid system and data recovery apparatus using galois field
CN101770409A (en) * 2008-12-31 2010-07-07 成都市华为赛门铁克科技有限公司 Method and device for data backup and recovery in redundant array of inexpensive disks
CN102722340A (en) * 2012-04-27 2012-10-10 华为技术有限公司 Data processing method, apparatus and system

Also Published As

Publication number Publication date
CN104516679A (en) 2015-04-15

Similar Documents

Publication Publication Date Title
CN104516679B (en) A kind of RAID data processing method and processing device
US7934120B2 (en) Storing data redundantly
CN103718162B (en) Method and apparatus for flexible RAID in SSD
US9552258B2 (en) Method and system for storing data in raid memory devices
CN104871138B (en) For the method and system that multidimensional RAID reconstruction and defect are avoided
US6950901B2 (en) Method and apparatus for supporting parity protection in a RAID clustered environment
US7577866B1 (en) Techniques for fault tolerant data storage
Baek et al. Reliability and performance of hierarchical RAID with multiple controllers
CN101625652B (en) Multi-disk fault-tolerant system and methods for generating check block and recovering data block
CN104347122B (en) A kind of access method and device of message type memory modules
US20130132770A1 (en) Method and apparatus for reconstructing redundant array of inexpensive disks, and system
JP2009514056A (en) Data storage array
CN106100801A (en) A kind of non-homogeneous erasure code method of cloud storage system
CN107844272A (en) A kind of cross-packet coding and decoding method for improving error correcting capability
CN103593260B (en) The guard method of a kind of metadata and device
CN106484559A (en) A kind of building method of check matrix and the building method of horizontal array correcting and eleting codes
CN109739436A (en) RAID reconstruction method, storage medium and device
CN104461373B (en) A kind of RAID data processing method and processing device
CN101251812A (en) Method for cluster system data fault tolerance
CN110389848A (en) Part based on segmented construction repeats code constructing method and malfunctioning node restorative procedure
US7356757B2 (en) Fault tolerance system and method for one or two failed disks in a disk array
CN108319427B (en) Method and device for realizing Raid10 supporting quick reconstruction
CN104281499B (en) RAID stripe mirror image data location mode based on even-odd check
CN104156276B (en) It is a kind of to prevent two pieces of RAID methods of disk failures
CN106933707B (en) Data recovery method and system of data storage device based on raid technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 Zhejiang City, Binjiang District Province, Torch Road, No. 581, block B, three-dimensional building, floor 9

Applicant after: MACROSAN TECHNOLOGIES Co.,Ltd.

Address before: 310052 Zhejiang City, Binjiang District Province, Torch Road, No. 581, block B, three-dimensional building, floor 9

Applicant before: MACROSAN TECHNOLOGIES CO.,LTD.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A RAID data processing method and device

Effective date of registration: 20221208

Granted publication date: 20171017

Pledgee: Bank of Hangzhou Limited by Share Ltd. science and Technology Branch

Pledgor: MACROSAN TECHNOLOGIES Co.,Ltd.

Registration number: Y2022980025666

PE01 Entry into force of the registration of the contract for pledge of patent right